Purdue University proudly presents. Aaron Jarvis, Network Engineer.

Size: px
Start display at page:

Download "Purdue University proudly presents. Aaron Jarvis, Network Engineer. www.purdue.edu/securepurdue"

Transcription

1 Purdue University proudly presents Aaron Jarvis, Network Engineer

2 Any devices or software shown during this presentation are for demonstration purposes only. Purdue University does not endorse or support any devices or software being used in this presentation.

3 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

4 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

5 Global Statistics from Gartner Estimated 2.6 Billion cell phones in circulation by 2009 Smart phones will represent 1/5 th of all phone sales in 2008 Voice, data, video

6 Cellular Networks Analog GSM AT&T/Cingular, T-Mobile CDMA Verizon, Sprint iden Nextel

7 Cellular Networks Analog Analog Mobile Phone System(AMPS) Deployed in 1980 s Still in use today! Transmit/Receive without encryption Easily eavesdropped by using a scanner

8 Cellular Networks GSM Global System for Mobile Communications Widespread use SIM Stores private information allowing user to switch phones and take information with them Encrypted voice from mobile device to cellular network

9 Cellular Networks CDMA Code Division Multiple Access Originally developed by US Navy Encrypted voice from mobile device to cellular network No SIM card Some carriers providing service that transfers private information between phones

10 Cellular Networks iden Integrated Digital Enhanced Network Developed by Motorola Push to talk

11 Risks with Cell Phones Loss Eavesdropping Location Financial

12 Risks with Cell Phones Loss Physical Address book, account numbers, passwords Treat your cell phone like it was a laptop Lock or password protect if possible Disable bluetooth when not in use

13 Risks with Cell Phones Eavesdropping Voice Can be intercepted with right equipment Talking loud Data Bluetooth More in next section

14 Risks with Cell Phones Location Many phones with integrated GPS receivers Could be used for tracking

15 Risks with Cell Phones Financial Report a lost or stolen phone immediately May be liable for calls made if not reported in a timely fashion Roaming International Many countries > $1.00 min Domestic Automatic, can cost $$$ Less and less a problem due to greater coverage and agreements through providers

16 Upgrading or Replacing Cell Phones Before discarding, recycling, etc Perform a factory reset on the device Erases all private information on the phone

17 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

18 What is bluetooth? Wireless technology used to allow communication between electronic devices(phones, cars, keyboards, mice) Typically around 30 feet range Creates a personal area network

19 How does bluetooth work? Uses 2.4Ghz Shared with Wifi, cordless phones,microwaves Low power transmitters Pairing between devices Agree to communicate with each other

20 Versions of Bluetooth 1.0/1.0B Introduced in 1998 Not used much as device interoperability was not very good in this version 1.1 First widely used version Greater interoperability

21 Versions of Bluetooth 1.2 Backwards compatible with version 1.1 Adaptable frequency hopping 1Mbps data rate Improved audio through retransmission

22 Versions of Bluetooth EDR Backwards compatible with previous versions 3Mbps data rate Lower power consumption Improved multi-link connectivity Pairing to more than one device at a time

23 According to the Bluetooth Special Interest Group(SIG) In order to break into a bluetooth device the following must take place Force two paired bluetooth devices to break their connection Steal/Capture the packets used to resend the PIN Decrypt the PIN

24 Bluetooth Sniffing Equipment Some commercially made equipment available but very expensive Bluesniper rifle - Homemade ~$300 Range ~ 1 mile

25 Bluetooth Security Threats Bluejacking Allows users to send business cards anonymously Does not allow data access to your phone Eliminate threat by Making sure device is in non-discoverable mode

26 Bluetooth Security Threats Bluesnarfing Allows access to data on phone Make phone calls Send/Receive text messages Requires advanced equipment and knowledge Must be within 30ft range Eliminate threat by Making sure device is in non-discoverable mode Still vulnerable, but much harder to exploit Upgrade phone or obtain patched software

27 Bluetooth Security Threats Bluebugging Allows access to data on phone Make phone calls Send/Receive text messages Requires advanced equipment and knowledge Must be within 30ft range Eliminate threat by Making sure device is in non-discoverable mode Still vulnerable, but much harder to exploit Upgrade phone or obtain patched software

28 Bluetooth Best Practices Disable when not in use Use a PIN greater than 8 digits Put device in non-discoverable mode Update to newest software if using older phone to patch vulnerabilities

29 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

30

31

32 Risks with Flash Drives Physical Loss If data is unencrypted then person has free access to content Malware Reported instances of digital picture frames with malware preloaded Use a virus scanner on new devices to ensure its safe to use

33 Methods to Secure Data on Flash Drives Encryption Software Truecrypt FreeOTFE Hardware Ironkey After 10 invalid attempt device issues a self destruct sequence and all data and encryption keys are erased Biometrics Fingerprint

34 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

35 What is VoIP? Voice-over IP Make voice calls to PSTN or other users Commonly uses Internet to reach service provider Phone adapters allow for service similar to traditional analog phone service Softphones allow for service to be used from a computer

36 Enterprise vs. Personal Solutions Features More than just dial tone Security Signaling and Media Encryption Quality of Service Ensure voice packets are treated as higher priority than data

37 Live Demo Capturing a Phone Call made via Vonage USB Phone

38 Cellular Security Bluetooth Security Flash Drive Security VoIP Security

39 Questions or Comments?

Emerging Wireless Technologies

Emerging Wireless Technologies Emerging Wireless Technologies QCHAT The Future of Push-to-Talk Communications Foreword: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements in the wireless

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by

More information

Wireless Broadband Access

Wireless Broadband Access Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled

More information

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish

More information

Security Requirements for Wireless Networking

Security Requirements for Wireless Networking Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

Wireless Mobile speaker

Wireless Mobile speaker Wireless Mobile speaker lowdi.com 1 2 3 1 2 3 4 On/Off switch Micro USB charging port Audio input Main control button Side Front 4 5 6 5 6 Volume controls LED status light Make sure that Lowdi is fully

More information

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph . Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

Logitech Advanced 2.4 GHz Technology

Logitech Advanced 2.4 GHz Technology Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

ShoreTel Mobility Version 4.6 Platform Support Guide. Rev. 1

ShoreTel Mobility Version 4.6 Platform Support Guide. Rev. 1 ShoreTel Mobility Version 4.6 Platform Support Guide Rev. 1 Document and Software Copyrights Copyright 1998-2011 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United

More information

VoIP - POTS - Mobile. Phone Service Choices. http://mlcug.org/ May 2012 1

VoIP - POTS - Mobile. Phone Service Choices. http://mlcug.org/ May 2012 1 VoIP - POTS - Mobile Phone Service Choices http://mlcug.org/ May 2012 1 Basic service choices VoIP - Voice over IP o Uses the Internet as your phone line o WiFi (radio) or Ethernet connected phones POTS

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

ODOT Surveyor s Conference

ODOT Surveyor s Conference Introduction to This document describes the process that will enable you to access the ODOT servers and Microsoft Outlook (E-mail) when you are away from your office and not on the internet. The process

More information

User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7

User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7 BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

By: Jen DosSantos, Kerry Cassidy & Mike Dunn

By: Jen DosSantos, Kerry Cassidy & Mike Dunn By: Jen DosSantos, Kerry Cassidy & Mike Dunn VoIP is an acronym for Voice over Internet Protocol. VoIP describes any kind of connection uses the internet to make phone calls. VoIP calls can be made from

More information

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Logitech Advanced 2.4 GHz Technology With Unifying Technology

Logitech Advanced 2.4 GHz Technology With Unifying Technology Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

How To Understand The History Of The United States

How To Understand The History Of The United States WIRELESS GLOSSARY OF TERMS Air Interface: The operating system of a wireless network. Technologies include AMPS, TDMA, CDMA, GSM and iden. AMPS: Advanced Mobile Phone Service (AMPS) is the original analog

More information

L-3 Guardian SME PED Frequently Asked Questions

L-3 Guardian SME PED Frequently Asked Questions 1. What is L-3 Guardian and why do I want one? L-3 Guardian was developed under the NSA Secure Mobile Environment Personal Electronic Device (SME PED) Program. L-3 Guardian is a wireless handheld PDA which

More information

Chapters 1-21 Introduction to Wireless Communication Systems

Chapters 1-21 Introduction to Wireless Communication Systems Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

Optimizing Wireless Networks.

Optimizing Wireless Networks. from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical

More information

THE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability

THE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability THE SUNSET OF 2G A KORE White Paper Better Coverage, Choice & Reliability The dawn of 4G LTE connectivity brings with it new possibilities for connectivity and mobile devices. But as the introduction of

More information

Unified messaging is provided to over 1,000 users today and continues to increase along with campus growth.

Unified messaging is provided to over 1,000 users today and continues to increase along with campus growth. IV. Voice Services Current Outlook Voice services on campus and at several off-campus sites are provided by an Aastra MD110 PBX. There are approximately 17,200 campus lines and 1,000 trunk lines. The telephone

More information

1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?

1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology? X3 Micro FAQ X3 Micro General 1. What is the main difference between the X3 micro and other Bluetooth headsets? 2. What is included in the X3 micro package? 3. How does the X3 micro use the Bluetooth technology?

More information

About Sectra Communications

About Sectra Communications Panthon About Sectra Communications We provide secure communication solutions for European government authorities, defence departments and other critical functions of society. We have a solid core expertise

More information

802.11b and associated network security risks for the home user

802.11b and associated network security risks for the home user 802.11b and associated network security risks for the home user by Michael Osten mosten@bleepyou.com Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework

More information

Review of Cell Phone Technology

Review of Cell Phone Technology Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000

More information

WorkTime UC Mobile Admin Guide

WorkTime UC Mobile Admin Guide WorkTime UC Mobile Admin Guide Release: 20.1.1 Android 20.1.2 ios Document Version 1.0 Table of Contents 1 About XO Hosted PBX UC Mobile Client...1 2 Use Cases...2 2.1 Placing Outbound Calls... 2 2.2 Receiving

More information

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3 Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched

More information

Cloud Voice A new and simpler way to deliver your voice communications

Cloud Voice A new and simpler way to deliver your voice communications Cloud Voice A new and simpler way to deliver your voice communications The solution in a nut shell Mogul Wave offers a SIP solution based on: SIP phones (hard/soft phones) SIP accounts - Mogul Wave s on-net

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

Wireless Network Policy

Wireless Network Policy Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of

More information

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer

More information

Telecommunications and the Information Age ET108B. Cell Phone Network

Telecommunications and the Information Age ET108B. Cell Phone Network Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Wireless Local Area Network

Wireless Local Area Network Wireless Local Area Network ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand iwing Lab CPE

More information

MaXphone Multi-Access Extension for Smartphones

MaXphone Multi-Access Extension for Smartphones MaXphone Multi-Access Extension for Smartphones PSCR Public Safety Broadband Stakeholder Conference 2014 Per Johansson pjohansson@maxentric.com DHS Wireless Broadband Technology Demonstrator BAA DHS 12-10

More information

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

Cellebrite UFED Physical Pro Cell Phone Extraction Guide Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research

More information

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals. Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,

More information

Policy and Profile Reference Guide

Policy and Profile Reference Guide BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60 SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS

More information

User Guide. Memo S580. www.poshmobile.com

User Guide. Memo S580. www.poshmobile.com User Guide Memo S580 www.poshmobile.com Welcome to POSH S580 Memo Quick Guide S580 is designed with Android system, support dual Sim and dual stand-by. Except for the standard communication function, it

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Polycom SoundStation2W What is SoundStation2W? SoundStation2W is Polycom s next-generation, wireless conference phone that gives users the freedom to conference anywhere team

More information

SmartLinx U250 Presentation

SmartLinx U250 Presentation SmartLinx U250 Presentation What Is? The SmartLinX is a Hardware/Software solution that allows your Cellular Smartphone to make and receive calls over your existing Home or Office landline/voip connection.

More information

FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction This document provides telecommunications management information for organizations that use the

More information

Exactly the Same, but Different

Exactly the Same, but Different Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

THE ENTERPRISE MOBILITY POLICY GUIDEBOOK

THE ENTERPRISE MOBILITY POLICY GUIDEBOOK THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Bluetooth wireless technology basics

Bluetooth wireless technology basics Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating

More information

WWW.SILENTCIRCLE.COM

WWW.SILENTCIRCLE.COM INTRODUCING THE WORLD S FIRST ENTERPRISE PRIVACY PLATFORM Why Privacy? PRIVACY IS INCREASINGLY UNDER THREAT IN TODAY S MOBILE WORLD Traditional security solutions weren t built for mobile environments

More information

Security Considerations for Cellular 3G Modems & 3G Wireless Routers

Security Considerations for Cellular 3G Modems & 3G Wireless Routers Security Considerations for Cellular 3G Modems & 3G Wireless Routers Roque Thuo Wireless Engineer Rf Wireless, LLC 1616 S. Stapley Dr. Suite103, Mesa AZ 85204 1 About RfWeL RfWeL, Radio Frequency Wireless

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

AIRAVE Frequently Asked Questions

AIRAVE Frequently Asked Questions AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

Konftel 300M Quick Reference Guide

Konftel 300M Quick Reference Guide Conference phones for every situation Konftel 300M Quick Reference Guide ENGLISH Description The Konftel 300M is a battery-operated wireless conference phone that can be connected to mobile networks (GSM/3G)

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre 1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM

2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM WHITE PAPER 2G vs 3G CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM A Quick History Lesson Back in 1995, the 2G digital wireless network was introduced, replacing the analog network launched in 1983. In

More information

An Overview of the Cisco Unified Wireless IP Phone 7921G

An Overview of the Cisco Unified Wireless IP Phone 7921G CHAPTER1 An Overview of the Cisco Unified Wireless IP Phone 7921G The Cisco Unified Wireless IP Phone 7921G provides wireless voice communication over an Internet Protocol (IP) network. Like traditional

More information

Troubleshooting BGAN

Troubleshooting BGAN Troubleshooting BGAN Version 1.0 22.08.06 This document provides information on troubleshooting the BGAN service. The topics covered include connecting to the terminal, network registration, IP data connection

More information

HOW W I R E L E S S T E C H N O L O G Y WORKS

HOW W I R E L E S S T E C H N O L O G Y WORKS HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone

More information

BroadTouch Business Communicator

BroadTouch Business Communicator BroadTouch Business Communicator Admin Guide Release 10.0.1 Document Version 1.0 Table of Contents 1 Summary of Changes...1 1.1 Changes for Release 10.0.1 Document Version 1... 1 2 About BroadTouch Business

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Revision B, March 2008 Document Part Number 15953.0001 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT Products Wireless Access Guide For BANDIT, BANDIT IP, BANDIT

More information

Development of Wireless Networks

Development of Wireless Networks Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.

More information

www.wilsonelectronics.com 1-866-294-1660

www.wilsonelectronics.com 1-866-294-1660 Apple iphone In phone mode dial *3001#12345#* then press CALL. The Field Test Screen will appear. The signal bars will now display the signal in a db reading. -51 is full signal, -105 is no signal. When

More information

5.1 Overview of Wireless Card Activation and Configuration

5.1 Overview of Wireless Card Activation and Configuration encor! enetworks TM Version A.5, January 2013 2013 Encore Networks, Inc. All rights reserved. Activating a Wireless Card in a Cellular Carrier Network Wireless connections use radiofrequencies (RF) through

More information

Wireless Cellular Networks: 1G and 2G

Wireless Cellular Networks: 1G and 2G Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available

More information

KT40. Quick Guide Android 4.4.2

KT40. Quick Guide Android 4.4.2 KT40 Quick Guide Android 4.4.2 List KT40 SPECIFICATION... 3 1 EXTERNAL STRUCTURE DESCRIPTION... 4 2 HOME SCREEN... 5 2.1 Notification Bar Icons... 6 3 OPERATION INSTRUCTIONS... 7 3.1 Dialing... 7 3.2 Notification

More information

Introduction to Wireless Communications and Networks

Introduction to Wireless Communications and Networks Introduction to Wireless Communications and Networks Tongtong Li Dept. Electrical and Computer Engineering East Lansing, MI 48824 tongli@egr.msu.edu 1 Outline Overview of a Communication System Digital

More information

CTAP Wireless Equipment Distribution Program Factsheet

CTAP Wireless Equipment Distribution Program Factsheet CTAP Wireless Equipment Distribution Program Factsheet The purpose of this factsheet is to provide CTAP customers with information about cell phones offered by CTAP, service plans, and wireless industry

More information

Building the Mobility Security Eco System in the Cloud for Universal Communications Fact Sheet.

Building the Mobility Security Eco System in the Cloud for Universal Communications Fact Sheet. Building the Mobility Security Eco System in the Cloud for Universal Communications Fact Sheet. [Type text] You ve probably heard about the Bring Your Own Device (BYOD) schemes that allow employees to

More information

Mobile network security report: Poland

Mobile network security report: Poland Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 6 Telecommunications, Networks, and Wireless. Computing Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and

More information

Contents. New features. Getting started. Entertainment. Transferring data. Managing your phone. Tools

Contents. New features. Getting started. Entertainment. Transferring data. Managing your phone. Tools User Guide Contents New features 1 Read before use 1 Unlocking with fingerprint 3 Safe 3 All focus mode 4 Taking photos from the timeline album screen 5 Scanning a QR code 6 Protecting your privacy Getting

More information

VOICE OVER IP VIEWPOINT 01/2006

VOICE OVER IP VIEWPOINT 01/2006 VOICE OVER IP VIEWPOINT 01/2006 17 JANUARY 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the

More information

Dell Business Phone for Android

Dell Business Phone for Android Dell Powered by Vonage Business Solutions Table of Contents Overview... 1 Capabilities... 1 Features... 1 Initial Setup... 2 Network Connections... 2 Provisioning... 3 Application Settings After Provisioning...

More information

Technical Manual. (TLT-2H GPS/GSM Vehicle Tracker) V1.5

Technical Manual. (TLT-2H GPS/GSM Vehicle Tracker) V1.5 Technical Manual (TLT-2H GPS/GSM Vehicle Tracker) V1.5 Product main features Real-time SMS query coordinates time position, Phone Position active help feature speed alarm function historical data uploading

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network

Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network Student Members: Danny Szczotka Chris Switzer Project Advisor: Dr. Liuqing Yang Graduate Student Advisor: Bo Yu Department

More information

V660. Quick Start Guide. Dual-Mode Phone. Version 1.00 04/2007 Edition 1. Copyright 2007. All rights reserved

V660. Quick Start Guide. Dual-Mode Phone. Version 1.00 04/2007 Edition 1. Copyright 2007. All rights reserved V660 Dual-Mode Phone Quick Start Guide Version 1.00 04/2007 Edition 1 Copyright 2007. All rights reserved 1 Overview Your V660 provides standard cellphone functions, and adds WiFi connectivity. In the

More information